Friday, March 4, 2016

Information Security Engineer

Information Security Engineer 
Lake Forest , CA
Phone and In person Interview

6 months C2H
 
 
  • Minimum of 5-7 years’ experience for Security Engineer
  • Comprehensive knowledge of multi-tier environments
  • Advanced experience with packet inspection / sniffers
  • Advanced experience in forensics and e-discovery
  • Advanced experience in automation and scripting of applications and systems
  • Advanced experience in anomaly detection (signature / behavioral)
  • Advanced experience with event and log correlation
  • Preferred Certifications:
    • CISSP
    • GIAC
    • CRISC
    • CEH
Job Description:
loanDepot is actively looking for an experienced Information Security Engineer to join our Cyber Security Practice. The Information Security Systems Engineer is responsible for guiding the implementation and monitoring of enterprise wide threat and vulnerability management solutions for loanDepot Enterprise systems. The Information Security Systems Engineer strives to enforce security best practices, policies, standards and guidance to ensure the safeguard of loanDepot’s proprietary data, infrastructure and resources from internal and external threats. The Information Security Systems Engineer is required to maintain a comprehensive understanding of services provided by loanDepot and develop relationships throughout the organization to assist Information Security in accomplishing its goals for the company. 
 Job Duties:
 
  • Configure resources to detect vulnerabilities to operating systems, applications, databases and the network infrastructure components. Detect, enumerate and classify major vulnerabilities, perform trend analysis and reporting for the Enterprise through the use of vulnerability assessment tools and methodologies. 
  • Evaluate the results from intrusion detection devices used for monitoring and reporting of network traffic for analysis of unwanted manipulation to systems, malicious network traffic, network attacks against vulnerable services, data driven attacks on applications, host based attacks or unauthorized access to sensitive data. 
  • Schedule and maintain security operations management of operating systems, security applications and network infrastructure components. Provide security configurations, controls for monitoring and centralized logging for network and server devices.
  • Coordinate resources for auditing of applications, operating systems and networks to provide a measurable technical assessment that includes, performing security vulnerability scans, reviewing access controls and analysis to ensure availability, confidentiality and integrity to help the organization meet internal and external regulatory compliance. 
  • Have the ability to formulate and interpret penetration test information results for the enterprise. Manage vulnerability detection, analysis and exploitation remediation to ensure confidentiality, integrity and availability of mission critical information assets. 
  • Mentor junior engineers in security knowledge and experience in technologies and methodologies as it relates to Security Information and Event Management (SIEM) devices, firewalls, proxies, access controls, encryption, networking, scripting, auditing, vulnerability assessments, intrusion management and operations. Additionally to assist with effective research, data gathering, analysis, metrics reporting and communications. 
  • Provide guidance using specialized knowledge and toolsets to operational teams during enterprise wide crisis scenarios outside of the routine change management process or production scope.
  • Have experience with enforcement of information security policies and procedures. Familiarity with information security standards such as NIST, ISO, COBIT, and associated security controls.
  • Must be self-directed with the ability to work independently to meet deadlines and produce quality work in a time-sensitive, fast-paced environment.
  
 
Requirements:
 
  • Bachelor’s Degree in Information Technology, Mathematics, Business, Engineering or related fields with 5-7 years of professional experience.
  • Comprehensive understanding of Security Methodologies
  • Experience with reverse engineering of malware
  • Advanced experience with TCPIP/UDP/ICMP
  • Comprehensive knowledge of the OSI Reference Model
  • Windows / Linux / Unix operating systems
  • Advanced experience with networking components (routers, switches, load balancers, wireless access points, etc.)
  • Comprehensive knowledge of firewalls, proxies, mail servers and web servers
  • Advanced experience with operational support for operating systems, applications and networks
  • Comprehensive knowledge of client/server relationships
  • Comprehensive knowledge of relational databases and structured query language
  • Advanced experience with vulnerability assessments
  • Advanced experience with intrusion management and its components
  • Comprehensive understanding of encryption algorithms and ciphers (PKI/SSL)
  • Comprehensive knowledge of malicious code (worms, viruses, spyware, etc.)
  • Comprehensive experience with Virtual Private Networking
  • Comprehensive knowledge of multi-tier environments
  • Advanced experience with packet inspection / sniffers
  • Advanced experience in forensics and e-discovery
  • Advanced experience in automation and scripting of applications and systems
  • Advanced experience in anomaly detection (signature / behavioral)
  • Advanced experience with event and log correlation
  • Effective team management, time management, and organizational skills
  • Effective written and verbal communication skills
  • Effective analytical and problem solving skills
  • Proficient in Microsoft Office Suite products
Sohail Abbas
Net2Source Inc.
Direct:201-479-3226| Tel: (201) 340.8700 x 465
Mobile: 201-448-1646